Proactive security for mobile devices
First Claim
1. A method for remotely managing a mobile device, the method comprising, at a computing device:
- issuing a request to a host device to initiate a security procedure associated with the mobile device, wherein the request causes the host device to gather at least one security parameter from the mobile device;
receiving, from the host device, information associated with (i) the at least one security parameter gathered by the host device, and (ii) a security risk factor calculated by the host device;
displaying, based on the information, an option to select from one or more security commands; and
in response to receiving a selection of a security command from the one or more security commands;
causing the security command to be transmitted to the mobile device, wherein the security command causes the mobile device to;
apply a first data security scheme that corresponds to the security command, wherein the first data security scheme is applied by carrying out a set of actions defined by the first data security scheme.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods, program products, and systems for proactively securing mobile devices are described. A mobile device can proactively determine whether the mobile device is associated with a security risk and the level of the security risk. Upon determining a security risk, the mobile device can transmit coordinates of its current geographic location to a server. To protect privacy of authorized users, the transmission can be disabled by entering a password. If multiple failed password attempts are detected, the mobile device can proactively increase a security level of the device, and selectively protect files or other content stored on the mobile device. In some implementations, the mobile device can be transitioned into a surveillance mode where the mobile device records or captures information associated with one or more of user actions, ambient sound, images, a trajectory of the device, and transmits the recorded or captured information to the network resource.
-
Citations
20 Claims
-
1. A method for remotely managing a mobile device, the method comprising, at a computing device:
-
issuing a request to a host device to initiate a security procedure associated with the mobile device, wherein the request causes the host device to gather at least one security parameter from the mobile device; receiving, from the host device, information associated with (i) the at least one security parameter gathered by the host device, and (ii) a security risk factor calculated by the host device; displaying, based on the information, an option to select from one or more security commands; and in response to receiving a selection of a security command from the one or more security commands; causing the security command to be transmitted to the mobile device, wherein the security command causes the mobile device to; apply a first data security scheme that corresponds to the security command, wherein the first data security scheme is applied by carrying out a set of actions defined by the first data security scheme. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. At least one non-transitory computer readable storage medium configured to store instructions that, when executed by at least one processor included in a computing device, cause the computing device to remotely manage a mobile device, by carrying out steps that include:
-
issuing a request to a host device to initiate a security procedure associated with the mobile device, wherein the request causes the host device to gather at least one security parameter from the mobile device; receiving, from the host device, information associated with (i) the at least one security parameter gathered by the host device, and (ii) a security risk factor calculated by the host device; displaying, based on the information, an option to select from one or more security commands; and in response to receiving a selection of a security command from the one or more security commands; causing the security command to be transmitted to the mobile device, wherein the security command causes the mobile device to; apply a first data security scheme that corresponds to the security command, wherein the first data security scheme is applied by carrying out a set of actions defined by the first data security scheme. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing device configured to remotely manage a mobile device, the computing device comprising:
-
at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the computing device to; issue a request to a host device to initiate a security procedure associated with the mobile device, wherein the request causes the host device to gather at least one security parameter from the mobile device; receive, from the host device, information associated with (i) the at least one security parameter gathered by the host device, and (ii) a security risk factor calculated by the host device; display, based on the information, an option to select from one or more security commands; and in response to receiving a selection of a security command from the one or more security commands; cause the security command to be transmitted to the mobile device, wherein the security command causes the mobile device to; apply a first data security scheme that corresponds to the security command, wherein the first data security scheme is applied by carrying out a set of actions defined by the first data security scheme. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification